unode / firefox_decryptLinks
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
☆2,373Updated last week
Alternatives and similar repositories for firefox_decrypt
Users that are interested in firefox_decrypt are comparing it to the libraries listed below
Sorting:
- firepwd.py, an open source tool to decrypt Mozilla protected passwords☆704Updated last month
- Mimikatz implementation in pure Python☆3,240Updated last month
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,925Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,524Updated last month
- SMBMap is a handy SMB enumeration tool☆2,013Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,425Updated 4 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,410Updated 3 weeks ago
- A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.☆1,918Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,227Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,605Updated last year
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,366Updated 9 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,776Updated 4 years ago
- ☆3,826Updated last year
- One rule to crack all passwords. or atleast we hope so.☆1,594Updated 4 years ago
- pwning IPv4 via IPv6☆1,881Updated last year
- CeWL is a Custom Word List Generator☆2,559Updated 3 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,958Updated 3 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,025Updated last week
- The ultimate WinRM shell for hacking/pentesting☆5,237Updated 3 weeks ago
- Windows Exploit Suggester - Next Generation☆4,750Updated last week
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,340Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,297Updated last week
- Username tools for penetration testing☆1,301Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,833Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆630Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,235Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,631Updated last month
- Monitor linux processes without root permissions☆5,865Updated 3 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,086Updated 2 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,162Updated 2 years ago